diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-09-10 22:15:00 -0500 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-09-10 22:15:00 -0500 |
commit | c507412ec09e6fa502fbd8587824901e1cf9a935 (patch) | |
tree | 0154752c7457233ad5de47f99ddeeb4f127b9c05 /docs/primitives/symmetric-encryption.rst | |
parent | 6f412a0fc35386ad980c5b3fa2bdb3c90436f3b6 (diff) | |
download | cryptography-c507412ec09e6fa502fbd8587824901e1cf9a935.tar.gz cryptography-c507412ec09e6fa502fbd8587824901e1cf9a935.tar.bz2 cryptography-c507412ec09e6fa502fbd8587824901e1cf9a935.zip |
change OFB iv to nonce to reflect dstufft nomenclature pitch
* Namely, we should try to call things IV if reuse leaks a small amount
of data and nonce if reuse can result in a complete break. This can
be somewhat ambiguous, but we'll track in #58
Diffstat (limited to 'docs/primitives/symmetric-encryption.rst')
-rw-r--r-- | docs/primitives/symmetric-encryption.rst | 14 |
1 files changed, 6 insertions, 8 deletions
diff --git a/docs/primitives/symmetric-encryption.rst b/docs/primitives/symmetric-encryption.rst index 7ec42a30..587c94b4 100644 --- a/docs/primitives/symmetric-encryption.rst +++ b/docs/primitives/symmetric-encryption.rst @@ -68,18 +68,16 @@ Modes reuse an ``initialization_vector`` with a given ``key``. -.. class:: cryptography.primitives.block.modes.OFB(initialization_vector) +.. class:: cryptography.primitives.block.modes.OFB(nonce) OFB (Output Feedback) is a mode of operation for block ciphers. It transforms a block cipher into a stream cipher. - :param bytes initialization_vector: Must be random bytes. They do not need - to be kept secret (they can be included - in a transmitted message). Must be the - same number of bytes as the - ``block_size`` of the cipher. Do not - reuse an ``initialization_vector`` with - a given ``key``. + :param bytes nonce: Must be random bytes. They do not need to be kept + secret (they can be included in a transmitted message). + Must be the same number of bytes as the ``block_size`` + of the cipher. Reuse of a ``nonce`` with a given + ``key`` can allow recovery of the original plaintext. Insecure Modes |